SlideShare a Scribd company logo
Computer Security
By Shahzad Younas
Superior University Depalpur
E-Mail: shzadyounas@gmail.com
Computer security and malware by shahzad younas
Topic : Computer Security
Group Name: Anmol
Group
Group Leader Shahzad Younas
Group Members
Ansar Sohail
Ali Shahzad
Fiaz Tabish
Objectives
Computer
Security
Computer
Security
CIA TrailCIA Trail MalwareMalware
Email Related
Issue
Email Related
Issue
Cyber VillainsCyber Villains ProtectionProtection
AuthenticationAuthentication ReferencesReferences
Computer Security
Computer security is the field
which tries to keep computer
safe and secure.
What does it mean to be secure?
• Include protection of information from
theft or corruption, or the preservation
of availability, as defined in the
security policy.
CIA Trial
It is combination of principles.
Security Objectives:
Confidentiality
Availability
Integrity
Confidentiality
• The information must just be
accessible to the authorized
people
• Confidentiality is keeping
information secret or private.
• Confidentiality might be important
for military, business or personal
reasons.
Integrity
• Integrity is the unauthorized writing or
modification of information.
• Guarantee that the data is what we
expect.
• Messages can’t be modified without
detection.
Availability
• System and networks must be up and
running.
• Availability is the prevention of
unauthorized withholding of information.
Malware
• Malware (short for malicious software)is any
software specifically designed to damage a computer
system without owner knowledge.
Examples:
Trojan Horses
Viruses
Worm
Trojan Horse
• A Trojan Horse is program that is
packaged with a useful application,
usually free, such as a screen or game
saver, but carries a destructive virus,
that creates problems for your
computer without your knowledge.
Trojan Horse
Some example of Trojan Horse
– TrojanDownloader:Win32/Zlob.gen!dll
– Trojan.Popuper.origin
– Downloader.Zlob.LI
Virus
• A computer virus is small software program
that can spread from one computer system
to another and cause interferences with
computer operations.
Worm
• A worm is a type of malicious software
(malware) that copies itself repeatedly into
a computers memory.
Email Related Issues
• Spam
• Phishing
• Pharm
• Web jack
Spam
• Spam is flooding the Internet with many copies of the
same message, in an attempt to force the message on
people who would not otherwise choose to receive it.
• It is also known as Bulk-email or Junk email
Spam
Phishing:
Example:
• You type, by mistake, “gmale.com” instead of
“gmail.com”
• gmale.com designs the site to look like
gmail.com so the user types in their info as
usual
• BAD! Now an evil person has your info!
A fake login page to be a trusted login page.
Computer security and malware by shahzad younas
Pharm
• Software that's planted on a computer; redirects to
impostor web page even though you type in the right
URL. You can protect yourself against it by going to
websites that contain https not http.
Computer security and malware by shahzad younas
Hacker
• Hacker is a term used by some to mean "a
clever programmer" and by others, especially
those in popular media, to mean "someone who
tries to break into computer systems.
Cracker
• A cracker also a someone who access a computer or
network illegally but has the intent of destroying data,
stealing information or other malicious action.
• Both hacker and cracker have advanced computer
and network skills.
Cyber terrorism
• Cyber terrorism can be also defined as the intentional
use of computer, networks, and public internet to cause
destruction and harm for personal objectives. Objectives
may be political or ideological since this can be seen as
a form of terrorism.
Hacker Activists
• "Hacker Activists" are people with a politically or socially
motivated purpose who break into a computer system.
"Hacker Activists" are people with a politically or socially
motivated purpose who break into a computer system.
Protection
Antivirus
Firewall
Enctyption
Antivirus
• Scans primary and secondary storage Devices.
• Detect & Destroy them.
• Keep update antivirus software.
It works in 2 ways:
1.It scans files to look for known viruses to
compare to a virus dictionary.
2. It analyzes suspicious behavior of computer
programs
Antivirus Software
• http://free.grisoft.com (AVG Antivirus Free)
• http://www.symantec.com/nav/nav_9xnt/ (Norton Antivirus)
• http://www.sophos.com/products/sav/ (Sophos Antivirus)
• http://www.pandasoftware.com/home/default.asp (Titanium Antivirus)
• http://www.trendmicro.com/en/home/us/personal.htm (Trend Micro PC-cillin)
• http://www.mcafee.com (McAfee VirusScan)
Online Antivirus Checkups
•http://housecall.trendmicro.com/
•http://www.pandasoftware.com/products/activescan.htm
Some links where we can find free antivirus software.
Firewall
• Windows Firewall (or any other firewall) can help alert
you to suspicious activity if a virus or worm attempts to
connect to your computer. It can also block viruses,
worms, and hackers from attempting to download
potentially harmful programs to your computer.
Some Firewall Software
• http://www.zonealarm.com (ZoneAlarm)
• http://www.mcafee.com (McAfee Personal Firewall)
• http://www.symantec.com/sabu/nis/npf/ (Norton Personal Firewall)
Encryption
• Turning readable data into a form of unreadable data in
order to prevent access that is not authorized Often used
in the military.
Authentication
Authentication is the process of determining
whether someone or something is, in fact,
who or what it is declared to be.
Examples:
• Password
• Biometrics
• Palm/Finger Print
Password
• A password or watchword is a form of authentication used to guard
or control a "resource"
Tips for Creating Secure Passwords
• http://www.microsoft.com/athome/security/privacy/password.mspx
• http://www.us-cert.gov/cas/tips/ST04-002.html
• http://www.symantec.com/homecomputing/library/pass_w.html
Use complex password:
Hint: iMnew145
Biometrics
• Biometrics is the science of measuring of human
physical or behavioral characteristics.
Palm/Finger Print
• Palm/Finger print scanning is a unique way to protect
your privacy. You run your finger across a window or
sensor to identify yourself.
Iris/Face
• Iris/ face scans are very reliable identifiers. Each individual person
has different eyes and face shape, making this type of scan very
effective.
Voice
• A systems that extract features from speech patterns in
order to recognize someone's voice which is then
digitalized and stored
References
• (http://www.pcworld.com/article/id,144017-
c,internetlegalissues/article.htm)
• (http://en.wikipedia.org/wiki/Firewall_(networking))
• http://www.questbiometrics.com
• http://www.nationalbiometric.org/
• http://www.news.com/2100-1001-205144.html
Computer security and malware by shahzad younas

More Related Content

ODP
Introduction To Hacking
PDF
How to analyze cyber threats
PPTX
Hacking and its types V2
PPT
Hacker
PPTX
Hacking
PPTX
Hacking
PPTX
how to prevent system from hacking...by sarika
PPTX
Ethical hacking for information security
Introduction To Hacking
How to analyze cyber threats
Hacking and its types V2
Hacker
Hacking
Hacking
how to prevent system from hacking...by sarika
Ethical hacking for information security

What's hot (20)

PPTX
Hacking and its types
PPTX
PDF
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
PPTX
Ethical hacking
PPTX
Is hacking good or bad
PPT
Ethical Hacking
PPTX
Cybercrime (Computer Hacking)
DOCX
Full seminar report on ethical hacking
PPTX
Hacking and privacy threats
PPTX
Hacking
PPTX
Ethical Hacking
PDF
Ethical hacking
PDF
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
PPT
Building a cybercrime case
PPTX
Ethical hacking
PPTX
Security Awareness And Hacking
PPTX
Ethical hacking
PPTX
Ethical hacking
PPTX
Mohammed Al Hadi Hacking And Hackers
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Hacking and its types
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
Ethical hacking
Is hacking good or bad
Ethical Hacking
Cybercrime (Computer Hacking)
Full seminar report on ethical hacking
Hacking and privacy threats
Hacking
Ethical Hacking
Ethical hacking
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Building a cybercrime case
Ethical hacking
Security Awareness And Hacking
Ethical hacking
Ethical hacking
Mohammed Al Hadi Hacking And Hackers
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Ad

Viewers also liked (12)

PPTX
Chapter 11 computer security and safety, ethics, and privacy
PPTX
cyber_security
PPT
3.2.1 computer security risks
PPTX
Malware- Types, Detection and Future
PPTX
4.2.1 computer security risks
PDF
Computer Security and Safety, Ethics & Privacy
PPTX
Security threats
PPT
Computer Malware
PPTX
Computer security threats & prevention
PDF
Computer Security Threats
PPTX
Cyber security
PPTX
Cyber crime and security ppt
Chapter 11 computer security and safety, ethics, and privacy
cyber_security
3.2.1 computer security risks
Malware- Types, Detection and Future
4.2.1 computer security risks
Computer Security and Safety, Ethics & Privacy
Security threats
Computer Malware
Computer security threats & prevention
Computer Security Threats
Cyber security
Cyber crime and security ppt
Ad

Similar to Computer security and malware by shahzad younas (20)

DOCX
Cyber crime
PDF
Information & cyber security, Winter training ,bsnl. online
PDF
Information cyber security
PPTX
Computer Security Presentation
PPTX
Personal Internet Security Practice
PPTX
Cyber security detailed ppt and understand
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPTX
CYBER SECURITY
PPTX
Cyber security
PPTX
cyber-security for companies and private
PPTX
Cyber security
PPTX
How to hack or what is ethical hacking
PPTX
Cybersecurity Training
PDF
Frontier Secure: Handout for small business leaders on "How to be Secure"
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
PPTX
Information security
PPTX
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
PPTX
Hacking
PPSX
Hacking
PPT
All about Hacking
Cyber crime
Information & cyber security, Winter training ,bsnl. online
Information cyber security
Computer Security Presentation
Personal Internet Security Practice
Cyber security detailed ppt and understand
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
CYBER SECURITY
Cyber security
cyber-security for companies and private
Cyber security
How to hack or what is ethical hacking
Cybersecurity Training
Frontier Secure: Handout for small business leaders on "How to be Secure"
Lecture 6 Cybersecurity-Basics and .pptx
Information security
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
Hacking
Hacking
All about Hacking

Recently uploaded (20)

PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Classroom Observation Tools for Teachers
PDF
Insiders guide to clinical Medicine.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
01-Introduction-to-Information-Management.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Institutional Correction lecture only . . .
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Cell Types and Its function , kingdom of life
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
RMMM.pdf make it easy to upload and study
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Microbial diseases, their pathogenesis and prophylaxis
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Classroom Observation Tools for Teachers
Insiders guide to clinical Medicine.pdf
Microbial disease of the cardiovascular and lymphatic systems
Final Presentation General Medicine 03-08-2024.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
O7-L3 Supply Chain Operations - ICLT Program
01-Introduction-to-Information-Management.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Pharma ospi slides which help in ospi learning
Institutional Correction lecture only . . .
Basic Mud Logging Guide for educational purpose
Cell Types and Its function , kingdom of life
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cell Structure & Organelles in detailed.
RMMM.pdf make it easy to upload and study
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

Computer security and malware by shahzad younas

  • 1. Computer Security By Shahzad Younas Superior University Depalpur E-Mail: shzadyounas@gmail.com
  • 3. Topic : Computer Security Group Name: Anmol Group Group Leader Shahzad Younas Group Members Ansar Sohail Ali Shahzad Fiaz Tabish
  • 4. Objectives Computer Security Computer Security CIA TrailCIA Trail MalwareMalware Email Related Issue Email Related Issue Cyber VillainsCyber Villains ProtectionProtection AuthenticationAuthentication ReferencesReferences
  • 5. Computer Security Computer security is the field which tries to keep computer safe and secure.
  • 6. What does it mean to be secure? • Include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.
  • 7. CIA Trial It is combination of principles. Security Objectives: Confidentiality Availability Integrity
  • 8. Confidentiality • The information must just be accessible to the authorized people • Confidentiality is keeping information secret or private. • Confidentiality might be important for military, business or personal reasons.
  • 9. Integrity • Integrity is the unauthorized writing or modification of information. • Guarantee that the data is what we expect. • Messages can’t be modified without detection.
  • 10. Availability • System and networks must be up and running. • Availability is the prevention of unauthorized withholding of information.
  • 11. Malware • Malware (short for malicious software)is any software specifically designed to damage a computer system without owner knowledge. Examples: Trojan Horses Viruses Worm
  • 12. Trojan Horse • A Trojan Horse is program that is packaged with a useful application, usually free, such as a screen or game saver, but carries a destructive virus, that creates problems for your computer without your knowledge.
  • 14. Some example of Trojan Horse – TrojanDownloader:Win32/Zlob.gen!dll – Trojan.Popuper.origin – Downloader.Zlob.LI
  • 15. Virus • A computer virus is small software program that can spread from one computer system to another and cause interferences with computer operations.
  • 16. Worm • A worm is a type of malicious software (malware) that copies itself repeatedly into a computers memory.
  • 17. Email Related Issues • Spam • Phishing • Pharm • Web jack
  • 18. Spam • Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. • It is also known as Bulk-email or Junk email
  • 19. Spam
  • 20. Phishing: Example: • You type, by mistake, “gmale.com” instead of “gmail.com” • gmale.com designs the site to look like gmail.com so the user types in their info as usual • BAD! Now an evil person has your info! A fake login page to be a trusted login page.
  • 22. Pharm • Software that's planted on a computer; redirects to impostor web page even though you type in the right URL. You can protect yourself against it by going to websites that contain https not http.
  • 24. Hacker • Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems.
  • 25. Cracker • A cracker also a someone who access a computer or network illegally but has the intent of destroying data, stealing information or other malicious action. • Both hacker and cracker have advanced computer and network skills.
  • 26. Cyber terrorism • Cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological since this can be seen as a form of terrorism.
  • 27. Hacker Activists • "Hacker Activists" are people with a politically or socially motivated purpose who break into a computer system. "Hacker Activists" are people with a politically or socially motivated purpose who break into a computer system.
  • 29. Antivirus • Scans primary and secondary storage Devices. • Detect & Destroy them. • Keep update antivirus software. It works in 2 ways: 1.It scans files to look for known viruses to compare to a virus dictionary. 2. It analyzes suspicious behavior of computer programs
  • 30. Antivirus Software • http://free.grisoft.com (AVG Antivirus Free) • http://www.symantec.com/nav/nav_9xnt/ (Norton Antivirus) • http://www.sophos.com/products/sav/ (Sophos Antivirus) • http://www.pandasoftware.com/home/default.asp (Titanium Antivirus) • http://www.trendmicro.com/en/home/us/personal.htm (Trend Micro PC-cillin) • http://www.mcafee.com (McAfee VirusScan) Online Antivirus Checkups •http://housecall.trendmicro.com/ •http://www.pandasoftware.com/products/activescan.htm Some links where we can find free antivirus software.
  • 31. Firewall • Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer.
  • 32. Some Firewall Software • http://www.zonealarm.com (ZoneAlarm) • http://www.mcafee.com (McAfee Personal Firewall) • http://www.symantec.com/sabu/nis/npf/ (Norton Personal Firewall)
  • 33. Encryption • Turning readable data into a form of unreadable data in order to prevent access that is not authorized Often used in the military.
  • 34. Authentication Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. Examples: • Password • Biometrics • Palm/Finger Print
  • 35. Password • A password or watchword is a form of authentication used to guard or control a "resource" Tips for Creating Secure Passwords • http://www.microsoft.com/athome/security/privacy/password.mspx • http://www.us-cert.gov/cas/tips/ST04-002.html • http://www.symantec.com/homecomputing/library/pass_w.html Use complex password: Hint: iMnew145
  • 36. Biometrics • Biometrics is the science of measuring of human physical or behavioral characteristics.
  • 37. Palm/Finger Print • Palm/Finger print scanning is a unique way to protect your privacy. You run your finger across a window or sensor to identify yourself.
  • 38. Iris/Face • Iris/ face scans are very reliable identifiers. Each individual person has different eyes and face shape, making this type of scan very effective.
  • 39. Voice • A systems that extract features from speech patterns in order to recognize someone's voice which is then digitalized and stored
  • 40. References • (http://www.pcworld.com/article/id,144017- c,internetlegalissues/article.htm) • (http://en.wikipedia.org/wiki/Firewall_(networking)) • http://www.questbiometrics.com • http://www.nationalbiometric.org/ • http://www.news.com/2100-1001-205144.html